Security Researcher II @ Microsoft
placeHerzliya, Tel Aviv District, Israel
attach_money $140,000
businessOn Site
scheduleFull Time
Posted 4 days ago
Your Application Journey
Interview
Email Hiring Manager
***** @microsoft.com
Recommended after applying
Job Details
About the Security Researcher II Role
Microsoft's Cloud Apps and Identity Research (CAIR) team is seeking a Security Researcher II with expertise in identity based attacks and threats. This role focuses on analyzing authentication protocols and exploring identity based attack vectors to guide product and engineering teams.
Responsibilities
- Analyze and understand authentication and network protocol internals.
- Independently reproduce identity-based attacks for research purposes.
- Examine identity logs and study current trends of identity attacks.
- Collaborate with product and engineering teams on sensor design and detection ideas.
- Support cybersecurity through expertise during security escalations and incidents.
Qualifications
The ideal candidate has at least 4+ years in security research, strong engineering skills in C/Python and proven expertise in Identity Security. A relevant B.Sc. or M.Sc. is required, and experience leading features from design through maintenance is highly valued.
Preferred Qualifications
Additional experience in offensive security research, recognized security research publications, and excellent interpersonal skills are a plus.
Key Skills/Competency
- Identity Security
- Authentication Protocols
- Cloud Technologies
- Network Security
- Security Research
- C/Python Development
- Forensics
- Incident Response
- Threat Analysis
- Collaboration
How to Get Hired at Microsoft
🎯 Tips for Getting Hired
- Customize your resume: Tailor experiences to identity security research.
- Showcase technical skills: Emphasize C/Python and protocol expertise.
- Research Microsoft: Understand their culture and security priorities.
- Prepare case studies: Highlight successful security research projects.
📝 Interview Preparation Advice
Technical Preparation
circle
Review authentication protocols and identity logs.
circle
Practice coding in C and Python.
circle
Study forensic methodologies for identity attacks.
circle
Analyze recent security research case studies.
Behavioral Questions
circle
Describe a challenging project in research.
circle
Discuss a time you collaborated on technical issues.
circle
Explain your approach to incident response.
circle
Share how you handle research setbacks.
Frequently Asked Questions
What identity security expertise is required for Microsoft Security Researcher II?
keyboard_arrow_down
Does Microsoft expect prior offensive security research experience for this role?
keyboard_arrow_down
How important is experience with C and Python for the Security Researcher II position at Microsoft?
keyboard_arrow_down
What educational background is preferred for a Security Researcher II at Microsoft?
keyboard_arrow_down
How does the role contribute to Microsoft’s cybersecurity posture?
keyboard_arrow_down